Blog Post Avoid Common Pitfalls When Auditing JDE E1 Security Auditing JDE E1 security is very complex. Carrie Curry outlines 6 common mistakes. Resource CategoriesAudit Reporting, Security Management, Segregation of Duties, SOX ComplianceERPJD Edwards EnterpriseOneProductSubject area / topic
Blog Post Why Proactive Segregation of Duties Controls are Important Read how proactive SoD controls help you to keep your system clean. Resource CategoriesSecurity Management, Segregation of Duties, SOX ComplianceERPsJD Edwards EnterpriseOne, Oracle E-Business SuiteProductSubject area / topic
Blog Post Don’t let inadequate fraud controls jeopardize your business (or your job!) Read about key measures to prevent fraud on your ERP System.Resource CategoriesFraud Prevention and Detection, Security Management, Segregation of DutiesERPsJD Edwards EnterpriseOne, JD Edwards World, Oracle E-Business Suite, Oracle ERP CloudProductSubject area / topic
Blog Post If they haven’t got it, they can’t flaunt it Preparing for external audit: Access Management; General Computing Controls (GCC) Part 1: Access Management. Resource CategoriesAudit Reporting, Security Management, Segregation of DutiesERPsJD Edwards EnterpriseOne, JD Edwards World, Oracle E-Business Suite, Oracle ERP CloudProductSubject area / topic
Blog Post Preparing for your External Audit: Remember the 5 Ps What are the objectives of an external audit and how to plan for it?Resource CategoriesAudit Reporting, Security ManagementERPsJD Edwards EnterpriseOne, JD Edwards World, Oracle E-Business Suite, Oracle ERP CloudProductSubject area / topic
Blog Post JD Edwards EnterpriseOne Security: Role-based Data Access Control What is Role-based data access and how does it help? Guidelines for implementing it in JDE E1.Resource CategorySecurity ManagementERPJD Edwards EnterpriseOneProductSubject area / topic
Blog Post Is your Job at Risk? JD Edwards Security Practices You Need to Know To create an effective security strategy, you need an holistic approach. Find out about the Top 10 security practices in JDE E1.Resource CategorySecurity ManagementERPJD Edwards EnterpriseOneProductSubject area / topic
Blog Post Do you know how much a Data Breach could cost your Company? 5 Ways to Protect Personal Data in JD Edwards.Resource CategoriesFraud Prevention and Detection, Security ManagementERPJD Edwards EnterpriseOneProductSubject area / topic
White Paper Best Practices for Role Design How to create an efficient, sustainable Security Model in JDE E1. Resource CategorySecurity ManagementERPJD Edwards EnterpriseOneProductSubject area / topic
Q Educational Video Bootcamp: How to Manage Multiple Roles in JD Edwards World On Demand Webinar: What you need to know to manage Multiple Roles effectively and efficiently.Resource CategorySecurity ManagementERPJD Edwards WorldProductSubject area / topic